Ronald Bartelshubandspoke.amastelek.com·Dec 20, 2024🌉Optimising Spanning Tree Protocol (STP) Configuration | The Importance of a Nominated Root Bridge🌲Spanning Tree Protocol (STP) is a vital mechanism in networking, preventing loops in Layer 2 topologies by selectively blocking redundant paths while ensuring network redundancy. However, one common mistake is leaving STP on its default settings, whi...2 likesspanning tree
BANDI SHEKARa-beginners-guide-to-ethical-hacking.hashnode.dev·Dec 8, 2024A Beginner’s Guide to Ethical HackingIntroduction In a world where cyberattacks are becoming increasingly sophisticated, ethical hacking has emerged as a critical tool for safeguarding sensitive information and systems. But what exactly is ethical hacking? And how can beginners get star...#cybersecurity for beginner
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS6 | Network Security SeriesProblem Statement Knowing the attacker's user-agent assists in creating robust filtering rules. What's the attacker's user agent? Flag Format: BUBT{Full User Agent} network_artifacts.pcapng Prerequisites Wireshark (viewing packet details) Solut...Cyber Skills Bootcamp Competition | BUBTbubt
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS5 | Network Security SeriesProblem Statement Understanding the value of compromised data assists in prioritizing incident response actions. What file was the attacker trying to exfiltrate? Flag Format: BUBT{filename} network_artifacts.pcapng Prerequisites Wireshark (basi...Cyber Skills Bootcamp Competition | BUBTbubt
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS4 | Network Security SeriesProblem Statement Identifying the port utilized by the web shell helps improve firewall configurations for blocking unauthorized outbound traffic. What port was used by the malicious web shell? Flag Format: BUBT{PortNo} network_artifacts.pcapng ...Cyber Skills Bootcamp Competition | BUBTCTF Writeup
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS3 | Network Security SeriesProblem Statement Knowing the directory where files uploaded are stored is important for reinforcing defenses against unauthorized access. Which directory is used by the website to store the uploaded files? Flag Format: BUBT{///} network_artifact...Cyber Skills Bootcamp Competition | BUBTbubt
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS2 | Network Security SeriesProblem Statement We need to identify if there were potential vulnerabilities exploited. What's the name of the malicious web shell uploaded? Flag Format: BUBT{..*} network_artifacts.pcapng Prerequisites Wireshark (basic use of filters, followin...Cyber Skills Bootcamp Competition | BUBTWireshark
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS1 | Network Security SeriesProblem Statement An anomaly was identified within our company's intranet when the Development team discovered an unfamiliar file on one of our web servers. Fearing possible malicious activity, the network team has captured a pcap file containing ...Cyber Skills Bootcamp Competition | BUBTbubt
Ronald Bartelshubandspoke.amastelek.com·Nov 20, 2024🦈Analyzing Raw Wi-Fi Packets on a Windows Laptop Using a TP-Link Archer T4U🏖️Wireshark is a powerful tool for network analysis, but on Windows, capturing raw 802.11 Wi-Fi frames isn't straightforward. Most Wi-Fi drivers on Windows, including those for the TP-Link Archer T4U, do not support monitor mode. To overcome this, we c...1 likeKali Linux
Aboelhamd Abdellatifaboelhmd.com·Nov 6, 2024Beginner Cybersecurity Tools: A Practical Guide to Wireshark, Nmap, and MetasploitIntroduction In the world of cybersecurity, tools like Wireshark, Nmap, and Metasploit are essential starting points for anyone looking to understand networks and digital security. Whether you're a novice eager to explore network analysis, scanning, ...#CyberTools